Search for dissertations about: "security policy compliance"
Showing result 1 - 5 of 13 swedish dissertations containing the words security policy compliance.
-
1. Building a national maritime security policy
Abstract : The issue of port security raised concerns at the highest levels after the terrorist attacks on September 11, 2001 against the United States. Security threats against ports and vessels acquired a new perspective and in 2002 the International Maritime Organization (IMO) adopted amendments to the International Convention for the Safety of Life at Sea (SOLAS), 1974, introducing Chapter XI-2 - Special measures to enhance maritime security. READ MORE
-
2. A method for analyzing value-based compliance in systems security
Abstract : Aim: The aim of this thesis is to design a method that supports analysis of different values that come into play in compliance and non compliance situations within information systems security (ISS). The thesis addresses the problem of lack of ISS compliance methods that support systematic analysis of compliant and non-compliant behaviours as well as the reasons for these behaviours. READ MORE
-
3. Enabling disability rights in practise : Understanding how the governance of state-funded personal assistance is fulfilling the Swedish LSS Act
Abstract : Personal assistance (PA) is stated in Article 19 of the UNCRPD as an internationally recognised disability right and is operationalised as a measure in the Swedish Act concerning Support and Service for Persons with Certain Functional Impairments (the LSS Act). The Act’s overall policy goal is to promote good living conditions for the eligible persons by enabling participation in society on equal terms with others. READ MORE
-
4. Controlling Weapons of Mass Destruction : An Evaluation of International Security Regime Significance
Abstract : This dissertation conducts an in-depth examination of the three weapons of mass destruction control regimes: the nuclear non-proliferation regime, the biological weapons control regime, and the chemical weapons control regime (NBC weapon control regimes). By examining a number of key indicators, this study investigates the specific ways each regime makes or does not make a difference in its respective issue area. READ MORE
-
5. Tailoring information security policies : a computerized tool and a design theory
Abstract : Protecting information assets in organizations is a must and one way for doing it is developing information security policy (ISP) to direct employees’ behavior and define acceptable procedures that employees have to comply with on a daily basis. However, compliance with the ISP is a perennial problem. READ MORE